• EN 419221-5:2018

    Current The latest, up-to-date edition.

    Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services

    Available format(s): 

    Language(s): 

    Published date:  02-05-2018

    Publisher:  Comite Europeen de Normalisation

    Pure ENs are not available for sale, please purchase a suitable national adoption

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    European foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Protection Profile
    5 Conformance Claim
    6 Security Problem Definition
    7 Security Objectives
    8 Extended Components Definitions
    9 Security Requirements
    10 Rationales
    Annex A (informative) - Mapping to Regulation
            (EU) 910/2014
    Bibliography

    Abstract - (Show below) - (Hide below)

    This part of EN 419221 specifies a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation]. The Protection Profile also includes optional support for protected backup of keys.The document follows the rules and conventions laid out in Common Criteria part 1 [CC1], Annex B "Specification of Protection Profiles".

    General Product Information - (Show below) - (Hide below)

    Committee CEN/TC 224
    Development Note Supersedes PREN 419221-5. (05/2018)
    Document Type Standard
    Publisher Comite Europeen de Normalisation
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    I.S. CWA 14170:2004 SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS
    I.S. CWA 14167-1:2002 SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES - PART 1: SYSTEM SECURITY REQUIREMENTS
    PREN 419241-1 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
    PREN 419241-2 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective